Movatterモバイル変換


[0]ホーム

URL:


CN111898158A - Encryption method for OFD (office file format) document - Google Patents

Encryption method for OFD (office file format) document
Download PDF

Info

Publication number
CN111898158A
CN111898158ACN202010741201.2ACN202010741201ACN111898158ACN 111898158 ACN111898158 ACN 111898158ACN 202010741201 ACN202010741201 ACN 202010741201ACN 111898158 ACN111898158 ACN 111898158A
Authority
CN
China
Prior art keywords
processes
encryption
receiving
confirmation signals
main
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010741201.2A
Other languages
Chinese (zh)
Other versions
CN111898158B (en
Inventor
陈杰
杨正道
冯辉
刘永博
丛培勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baiwang Co ltd
Original Assignee
Baiwang Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Baiwang Co ltdfiledCriticalBaiwang Co ltd
Priority to CN202010741201.2ApriorityCriticalpatent/CN111898158B/en
Publication of CN111898158ApublicationCriticalpatent/CN111898158A/en
Application grantedgrantedCritical
Publication of CN111898158BpublicationCriticalpatent/CN111898158B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The application discloses an OFD document encryption method, which comprises the following steps: selecting 1 process from the 5 processes as a main process to execute encryption operation, and enabling the rest processes to be standby; 5 processes are encrypted simultaneously; if the first process finishes encryption firstly, respectively sending a notification of selecting a main process to the other 4 processes, and after the other 4 processes receive the notification of the first process, pausing encryption speed measurement and sending a confirmation signal to the first process; the first process collects the confirmation signals and accumulates the number N; the first process sends N to the other processes respectively; the first process sends a 'working' state identifier to other processes at regular time while executing the encryption task, and the other processes determine that the first process is in an 'active' state after receiving the state identifier and keep a standby state. According to the encryption method of the OFD document, a multi-process encryption mode is adopted, the encryption fault tolerance rate is improved, the problem of a single-process mode is avoided, and uninterrupted encryption service can be provided.

Description

Encryption method for OFD (office file format) document
Technical Field
The application relates to the technical field of electronic documents, in particular to an OFD document encryption method.
Background
In the field of applying OFD document technology, a common OFD encryption method generally starts a process to encrypt an OFD document, and a specific process is described as follows:
1. the front end sends an encryption command.
2. The background starts a process that provides cryptographic services.
3. The background process waits for the reception of an instruction to encrypt the OFD document.
4. And after receiving the instruction, the background process starts to encrypt the OFD document.
5. And after the background process finishes encryption, waiting for the next encryption instruction.
6. The encrypted OFD is sent to the front end.
The encryption method is a single-loop process, which is simple and is shown in fig. 1.
The technology adopts a single-process mode, although the technology is simple, the fault tolerance rate is low, once the process is 'falsely dead', the background cannot provide encryption service, so that the foreground has no response, the process can be restarted only in a manual mode, and the user cannot sense the process in time, so that the user experience is very poor. Meanwhile, the maintenance cost is also increased, and operation and maintenance personnel need to be drawn out for maintenance.
Disclosure of Invention
The application aims to provide an OFD document encryption method. The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview and is intended to neither identify key/critical elements nor delineate the scope of such embodiments. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.
According to an aspect of an embodiment of the present application, there is provided an OFD document encryption method, including:
and 5 processes are adopted, 1 process is selected from the 5 processes to be used as a main process to execute encryption operation, and the other 4 processes are standby.
Further, the selecting 1 process from the 5 processes as a master process to perform an encryption operation includes:
the 5 processes are encrypted simultaneously; the 5 processes comprise a first process, a second process, a third process, a fourth process and a fifth process;
if the first process finishes encryption firstly, respectively sending a notification of selecting a main process to the other 4 processes, and after receiving the notification of the first process, pausing encryption speed measurement and sending a confirmation signal to the first process by the second process, the third process, the fourth process and the fifth process;
collecting the confirmation signals of the second process, the third process, the fourth process and the fifth process by the first process, and accumulating the number of the confirmation signals, and recording the number as N;
the first process sends N to a second process, a third process, a fourth process and a fifth process respectively, and after the second process receives N, if N is 3, the node candidate is confirmed to be successful, and the second process enters a standby state; after the third process receives the N, if the N is greater than 3, the first process candidate is confirmed to be successful, and a standby state is entered; after receiving the N, if N ≧ 3, the fourth process determines that the first process candidate is successful, and enters a standby state; after the fifth process receives the N, if the N is greater than 3, the first process candidate is confirmed to be successful, and a standby state is entered;
until the first process is successfully selected, the process starts to execute the encryption task; the first process sends a state identifier of 'working' to the other 4 processes respectively at regular time while executing the encryption task, and the 4 processes determine that the first process is in an 'active' state after receiving the state identifier and still keep a standby state.
Further, the method further comprises:
if the candidate process enters a 'false death' state in the running process, namely the candidate process becomes a 'zombie' process, the encryption work can not be executed any more, at the moment, the rest 4 processes can not receive the state identification of 'working' of the first process any more, then 4 processes start the process encryption speed measurement, and a main process is reselected.
Further, said reselecting a host process comprises:
and if the third process completes encryption firstly, the third process sends a notice of selecting the main process to the second process, the fourth process and the fifth process respectively, and after receiving the notice, the second process, the fourth process and the fifth process suspend encryption speed measurement and send a confirmation signal to the third process.
After receiving the confirmation signals of all the other processes, the third process accumulates the number of the confirmation signals and respectively sends the number to all the other processes, after receiving the number, the other processes respectively judge whether the number is more than 2, if the number is more than 2, the third process is confirmed to be successful in candidate, the third process starts to execute the encryption task, the other processes enter a standby state, similarly, the third process respectively sends a state identifier of 'working' to 3 other processes at regular time while executing the encryption task, and after receiving the state identifier, the 3 processes determine that the third process is in an 'active' state and still keep the standby state.
Further, the method further comprises:
if the second process and the fourth process complete the encryption speed measurement first, the second process and the fourth process are not allowed to send a notification of selecting the main process mutually;
and the second process sends a notice of selecting the main process to the first process, the third process and the fifth process, the first process, the third process and the fifth process send confirmation signals to the second process after receiving the notice, and the second process accumulates the number of the confirmation signals after receiving the confirmation signals.
And the fourth process sends a main process notification to the first process, the third process and the fifth process, the first process, the third process and the fifth process send confirmation signals to the fourth process after receiving the notification, and the fourth process accumulates the number of the confirmation signals after receiving the confirmation signals.
Further, the method further comprises: if only 4 processes are used for selecting the main process and more than 2 processes simultaneously complete the encryption speed measurement, the election cannot be successful, the encryption speed measurement needs to be restarted, and a new round of main process selection is started.
Further, the new round of selection main process comprises: recording the 4 processes as a first process, a second process, a third process and a fourth process respectively;
if the first process and the second process finish encryption speed measurement first, because the first process and the second process are candidates, the first process and the second process are not allowed to send a notification of selecting a main process to each other;
the first process sends a notice of selecting the main process to the third process and the fourth process, the third process and the fourth process send confirmation signals to the first process after receiving the notice, the first process accumulates the quantity of the confirmation signals, the total quantity is 2 after receiving the confirmation signals, the quantity of the confirmation signals is respectively sent to the other 2 processes, and after the third process and the fourth process receive the quantity of the confirmation signals, the third process and the fourth process find that the quantity of the confirmation signals does not exceed half of the total quantity of the processes, and then the first process candidate is unsuccessful.
Likewise, the second process candidate is also unsuccessful.
And (4) as the first process and the second process are not successfully selected, all the processes restart encryption speed measurement and start a new round of main selection process.
According to another aspect of the embodiments of the present application, there is provided an electronic apparatus including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor executing the program to implement the above-described encryption method for an OFD document.
According to another aspect of embodiments of the present application, there is provided a computer-readable storage medium having stored thereon a computer program, which is executed by a processor, to implement the above-described encryption method of an OFD document.
The technical scheme provided by one aspect of the embodiment of the application can have the following beneficial effects:
the encryption method for the OFD document, provided by the embodiment of the application, adopts a multi-process encryption mode, improves the encryption fault tolerance rate, avoids the problem of a single-process mode, and can ensure uninterrupted encryption service.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the embodiments of the application, or may be learned by the practice of the embodiments. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 shows a flow chart of an OFD encryption scheme of the prior art;
FIG. 2 is a diagram illustrating a process of selecting a process to perform encryption on a set of data in one embodiment of the application;
fig. 3 is a diagram illustrating a main process sending a status flag to a standby process according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It will be understood by those within the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
As shown in fig. 1, an embodiment of the present application provides an encryption method for an OFD document, including:
and 5 processes are adopted, 1 process is selected from the 5 processes to be used as a main process to execute encryption operation, and the other 4 processes are standby.
In order to avoid the problem of 'false death' possibly brought by a single process, the OFD document is encrypted by adopting 5 processes, 1 process is selected as a main process to execute encryption work in a consensus mode, and the other 4 processes are in standby.
For better description, 5 processes are respectively denoted as process 1, process 2, process 3, process 4, and process 5. The following describes how a process is selected to perform encryption on a set of data, see fig. 2 and 3:
1) starting 5 processes in the background, encrypting the data by the 5 processes simultaneously, wherein the encryption algorithm adopts symmetric encryption, the algorithm generally adopts AES, SM4 and other algorithms, and the 5 processes are not malicious processes and are completely trusted.
2) If the process 1 finishes encryption first, a notification of selecting a main process is sent to the other 4 processes (shown in fig. 2), and after the processes 2, 3, 4 and 5 receive the notification of the process 1, encryption speed measurement is suspended, and a confirmation signal is sent to the process 1;
3) the process 1 collects the confirmation signals of the process 2, the process 3, the process 4 and the process 5, and accumulates the number of the confirmation signals, and records the number as N;
4) the process 1 sends N to the process 2, the process 3, the process 4 and the process 5, respectively, and after the process 2 receives N, if N ≧ 3, the node candidate is confirmed to be successful, and the node candidate enters a standby state; after receiving N, if N > ═ 3, process 3 determines that process 1 candidate is successful and enters a standby state, after receiving N, process 4 determines that process 1 candidate is successful and enters a standby state if N > ═ 3, and after receiving N, process 5 determines that process 1 candidate is successful and enters a standby state if N > ═ 3;
5) by this point, process 1 candidate is successful and the process starts to perform the encryption task. As shown in fig. 3, while the process 1 executes the encryption task, it sends a "working" status identifier to the remaining 4 processes at regular time, and after receiving the status identifiers, the 4 processes recognize that the process 1 is in an "active" status, and still maintain a standby status.
In the above description, in the normal operation process, if the candidate process enters a "dead" state during the operation, that is, the candidate process becomes a "zombie" process, the encryption operation cannot be executed any more, and at this time, the remaining 4 processes cannot receive the state identifier of "working" in the process 1 any more, then 4 processes start the process encryption speed measurement, and a main process is reselected, and the steps are as follows:
1) if the process 3 completes encryption firstly, the process 3 sends a notification of selecting a main process to the process 2, the process 4 and the process 5 respectively, and after receiving the notification, the process 2, the process 4 and the process 5 suspend encryption speed measurement and send a confirmation signal to the process 3.
2) After receiving the confirmation signals of all the other processes, the process 3 accumulates the number of the confirmation signals, and respectively sends the number to all the other processes, after receiving the number, the other processes respectively judge whether the number is larger than 2, if the number is larger than 2, the process 3 is confirmed to be successful in candidate, the process 3 starts to execute the encryption task, the other processes enter a standby state, similarly, the process 3 respectively sends a state identifier of 'working' to the other 3 processes at regular time while executing the encryption task, and after receiving the state identifier, the 3 processes determine that the process 3 is in an 'active' state and still maintain the standby state.
In addition, after the process 1 in the "false death" state is restarted, the process directly enters the standby state to wait for the next round of candidates.
If more than 2 processes in the 5 processes complete the encryption speed measurement, the main process election specifically comprises the following processes:
1) if the process 2 and the process 4 firstly complete encryption speed measurement, as the process 2 and the process 4 are both candidates, the process 2 and the process 4 are not allowed to mutually send a notification of selecting a main process;
2) the process 2 sends a notice of selecting the main process to the process 1, the process 3 and the process 5, the process 1, the process 3 and the process 5 send confirmation signals to the process 2 after receiving the notice, and the process 2 accumulates the quantity of the confirmation signals after receiving the confirmation signals.
3) Meanwhile, the process 4 sends a main process notification to the processes 1, 3 and 5, the processes 1, 3 and 5 send acknowledgement signals to the process 4 after receiving the notification, and the process 4 accumulates the number of the acknowledgement signals after receiving the acknowledgement signals.
4) And if the process 2 and the process 4 are equal in ticket number and cannot be successfully selected, the encryption speed measurement needs to be restarted and a new process of selecting the main process is started.
If only 4 processes are selected and more than 2 processes simultaneously complete the encryption speed measurement, the race selection cannot be successful, the encryption speed measurement needs to be restarted, and a new process of selecting the main process is started. The 4 processes are respectively marked as process 1, process 2, process 3 and process 4, and the specific processes are described as follows:
1) if the process 1 and the process 2 finish encryption speed measurement first, as the process 1 and the process 2 are candidates, the process 1 and the process 2 are not allowed to send a notification of selecting a main process;
2) the process 1 sends a notification of selecting a main process to the process 3 and the process 4, the process 3 and the process 4 send confirmation signals to the process 1 after receiving the notification, the process 1 accumulates the number of the confirmation signals, the total number is 2, the number of the confirmation signals is respectively sent to the other 2 processes, and after the process 3 and the process 4 receive the number of the confirmation signals, the process 1 candidate is not successful if the number of the confirmation signals is found to be less than half of the total number of the processes (the value is 4).
3) Likewise, the process 2 candidate is also unsuccessful.
4) And (4) as the process 1 and the process 2 are not successfully selected, all the processes restart encryption speed measurement and start a new process of selecting the main process.
In conclusion, the consensus algorithm for selecting one process to execute the encryption task is adopted, so that the method has the main advantages of improving the fault tolerance rate of encryption, avoiding the problems of a single-process mode and ensuring uninterrupted encryption service.
The embodiment of the application adopts a multi-process encryption mode, the main process of the encryption process is selected by using the consensus algorithm, and after the main process is in a 'false death' state, the main process is reselected from other standby processes by using the consensus algorithm, so that the phenomenon of encryption task failure caused by the 'false death' of one process is avoided, the fault tolerance rate of encryption service is improved, the encryption service is stably and uninterruptedly provided for a user, the user experience is improved, and the operation and maintenance cost is saved because manual restart is not needed.
It should be noted that:
the term "module" is not intended to be limited to a particular physical form. Depending on the particular application, a module may be implemented as hardware, firmware, software, and/or combinations thereof. Furthermore, different modules may share common components or even be implemented by the same component. There may or may not be clear boundaries between the various modules.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose devices may be used with the teachings herein. The required structure for constructing such a device will be apparent from the description above. In addition, this application is not directed to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the present application as described herein, and any descriptions of specific languages are provided above to disclose the best modes of the present application.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the application, various features of the application are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: this application is intended to cover such departures from the present disclosure as come within known or customary practice in the art to which this invention pertains. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this application.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The above-mentioned embodiments only express the embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (9)

CN202010741201.2A2020-07-232020-07-23Encryption method of OFD (optical frequency division) documentActiveCN111898158B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202010741201.2ACN111898158B (en)2020-07-232020-07-23Encryption method of OFD (optical frequency division) document

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202010741201.2ACN111898158B (en)2020-07-232020-07-23Encryption method of OFD (optical frequency division) document

Publications (2)

Publication NumberPublication Date
CN111898158Atrue CN111898158A (en)2020-11-06
CN111898158B CN111898158B (en)2023-09-26

Family

ID=73182382

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202010741201.2AActiveCN111898158B (en)2020-07-232020-07-23Encryption method of OFD (optical frequency division) document

Country Status (1)

CountryLink
CN (1)CN111898158B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN114116201A (en)*2021-10-292022-03-01上海欣兆阳信息科技有限公司Data interaction method between marketing platform and media platform

Citations (35)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1642101A (en)*2004-01-152005-07-20英业达股份有限公司 Whole process remote control system and method
WO2006061251A1 (en)*2004-12-112006-06-15Smapper Technologies GmbhProcess and appliance for data processing and computer programme product
US20070101324A1 (en)*2005-10-312007-05-03Microsoft CorporationInstrumentation to find the thread or process responsible for an application failure
CN101777020A (en)*2009-12-252010-07-14北京讯鸟软件有限公司Fault tolerance method and system used for distributed program
US20100254254A1 (en)*2009-04-062010-10-07Oracle International CorporationProcess activeness check
KR101036750B1 (en)*2011-01-042011-05-23주식회사 엔피코어 Zombie behavior blocking system and method
CN102193810A (en)*2010-03-122011-09-21微软公司Cross-module inlining candidate identification
CN102387040A (en)*2011-11-012012-03-21深圳市航天泰瑞捷电子有限公司Method and system for keeping high-speed stable running of front-end processor
US20130024731A1 (en)*2008-10-292013-01-24Aternity Information Systems Ltd.Real time monitoring of computer for determining speed and energy consumption of various processes
KR20130035600A (en)*2011-09-302013-04-09주식회사 엔피코어Method and apparatus for preventing data loss
CN104991811A (en)*2015-08-072015-10-21北京元心科技有限公司Process running state adjusting method in isolation system switching period and intelligent terminal
US20160378979A1 (en)*2015-06-272016-12-29Mcafee, Inc.Detection of malicious thread suspension
US20170063544A1 (en)*2015-08-262017-03-02Rubicon Labs, Inc.System and method for sharing data securely
CN106529951A (en)*2016-12-302017-03-22杭州云象网络技术有限公司Node consensus verification method under league chain network through asynchronous mode
EP3145115A1 (en)*2015-09-172017-03-22Samsung Electronics Co., Ltd.Input apparatus and controlling method thereof
US20170085443A1 (en)*2015-09-222017-03-23Microsoft Technology Licensing, LlcExternal process user interface isolation and monitoring
CN106874126A (en)*2017-01-242017-06-20厦门天锐科技股份有限公司Host process method for detecting abnormality in a kind of software development
CN107239332A (en)*2017-05-242017-10-10努比亚技术有限公司A kind of process handling method, mobile terminal and computer-readable recording medium
US20170359246A1 (en)*2016-06-132017-12-14Intel CorporationSystems and methods for detecting a zombie server
CN107526632A (en)*2016-06-202017-12-29咪咕互动娱乐有限公司Process pool extending method and device
CN107533721A (en)*2015-03-162018-01-02Swrve新媒体有限公司For it is enhanced by all kinds of means, the system and method for the automation activity of multi-option, high orientation
CN107545186A (en)*2017-09-062018-01-05杭州安恒信息技术有限公司It is quick to solve the idle method, apparatus of engine and system
CN107819798A (en)*2016-09-132018-03-20阿里巴巴集团控股有限公司Data capture method, Front End Server and data-acquisition system
CN108810100A (en)*2018-05-222018-11-13郑州云海信息技术有限公司A kind of electoral machinery of host node, device and equipment
CN109033819A (en)*2018-05-232018-12-18福建天晴数码有限公司Protect method, the computer readable storage medium of application process continuous service
CN109189854A (en)*2018-08-142019-01-11新华三技术有限公司成都分公司The method and node device of sustained traffic are provided
CN109324952A (en)*2018-09-302019-02-12武汉斗鱼网络科技有限公司 A method and device for detecting the number of process instances based on a memory-mapped file
CN109714404A (en)*2018-12-122019-05-03中国联合网络通信集团有限公司Block chain common recognition method and device based on Raft algorithm
CN110321203A (en)*2018-03-292019-10-11武汉斗鱼网络科技有限公司The seemingly-dead processing method of background process and client
CN110515820A (en)*2019-08-292019-11-29北京浪潮数据技术有限公司A kind of server failure maintaining method, device, server and storage medium
CN110602705A (en)*2019-09-202019-12-20浙江树人学院(浙江树人大学)Improved PBFT consensus method suitable for Internet of vehicles environment
CN110837433A (en)*2019-11-152020-02-25珠海豹趣科技有限公司Performance optimization method and device and electronic equipment
CN110868459A (en)*2019-11-012020-03-06腾讯科技(深圳)有限公司Data transmission method, device, terminal and storage medium
CN111314443A (en)*2020-01-212020-06-19苏州浪潮智能科技有限公司 Node processing method, device and device and medium based on distributed storage system
CN111414603A (en)*2020-03-172020-07-14用友网络科技股份有限公司Application based on communication mechanism between named pipelines

Patent Citations (35)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1642101A (en)*2004-01-152005-07-20英业达股份有限公司 Whole process remote control system and method
WO2006061251A1 (en)*2004-12-112006-06-15Smapper Technologies GmbhProcess and appliance for data processing and computer programme product
US20070101324A1 (en)*2005-10-312007-05-03Microsoft CorporationInstrumentation to find the thread or process responsible for an application failure
US20130024731A1 (en)*2008-10-292013-01-24Aternity Information Systems Ltd.Real time monitoring of computer for determining speed and energy consumption of various processes
US20100254254A1 (en)*2009-04-062010-10-07Oracle International CorporationProcess activeness check
CN101777020A (en)*2009-12-252010-07-14北京讯鸟软件有限公司Fault tolerance method and system used for distributed program
CN102193810A (en)*2010-03-122011-09-21微软公司Cross-module inlining candidate identification
KR101036750B1 (en)*2011-01-042011-05-23주식회사 엔피코어 Zombie behavior blocking system and method
KR20130035600A (en)*2011-09-302013-04-09주식회사 엔피코어Method and apparatus for preventing data loss
CN102387040A (en)*2011-11-012012-03-21深圳市航天泰瑞捷电子有限公司Method and system for keeping high-speed stable running of front-end processor
CN107533721A (en)*2015-03-162018-01-02Swrve新媒体有限公司For it is enhanced by all kinds of means, the system and method for the automation activity of multi-option, high orientation
US20160378979A1 (en)*2015-06-272016-12-29Mcafee, Inc.Detection of malicious thread suspension
CN104991811A (en)*2015-08-072015-10-21北京元心科技有限公司Process running state adjusting method in isolation system switching period and intelligent terminal
US20170063544A1 (en)*2015-08-262017-03-02Rubicon Labs, Inc.System and method for sharing data securely
EP3145115A1 (en)*2015-09-172017-03-22Samsung Electronics Co., Ltd.Input apparatus and controlling method thereof
US20170085443A1 (en)*2015-09-222017-03-23Microsoft Technology Licensing, LlcExternal process user interface isolation and monitoring
US20170359246A1 (en)*2016-06-132017-12-14Intel CorporationSystems and methods for detecting a zombie server
CN107526632A (en)*2016-06-202017-12-29咪咕互动娱乐有限公司Process pool extending method and device
CN107819798A (en)*2016-09-132018-03-20阿里巴巴集团控股有限公司Data capture method, Front End Server and data-acquisition system
CN106529951A (en)*2016-12-302017-03-22杭州云象网络技术有限公司Node consensus verification method under league chain network through asynchronous mode
CN106874126A (en)*2017-01-242017-06-20厦门天锐科技股份有限公司Host process method for detecting abnormality in a kind of software development
CN107239332A (en)*2017-05-242017-10-10努比亚技术有限公司A kind of process handling method, mobile terminal and computer-readable recording medium
CN107545186A (en)*2017-09-062018-01-05杭州安恒信息技术有限公司It is quick to solve the idle method, apparatus of engine and system
CN110321203A (en)*2018-03-292019-10-11武汉斗鱼网络科技有限公司The seemingly-dead processing method of background process and client
CN108810100A (en)*2018-05-222018-11-13郑州云海信息技术有限公司A kind of electoral machinery of host node, device and equipment
CN109033819A (en)*2018-05-232018-12-18福建天晴数码有限公司Protect method, the computer readable storage medium of application process continuous service
CN109189854A (en)*2018-08-142019-01-11新华三技术有限公司成都分公司The method and node device of sustained traffic are provided
CN109324952A (en)*2018-09-302019-02-12武汉斗鱼网络科技有限公司 A method and device for detecting the number of process instances based on a memory-mapped file
CN109714404A (en)*2018-12-122019-05-03中国联合网络通信集团有限公司Block chain common recognition method and device based on Raft algorithm
CN110515820A (en)*2019-08-292019-11-29北京浪潮数据技术有限公司A kind of server failure maintaining method, device, server and storage medium
CN110602705A (en)*2019-09-202019-12-20浙江树人学院(浙江树人大学)Improved PBFT consensus method suitable for Internet of vehicles environment
CN110868459A (en)*2019-11-012020-03-06腾讯科技(深圳)有限公司Data transmission method, device, terminal and storage medium
CN110837433A (en)*2019-11-152020-02-25珠海豹趣科技有限公司Performance optimization method and device and electronic equipment
CN111314443A (en)*2020-01-212020-06-19苏州浪潮智能科技有限公司 Node processing method, device and device and medium based on distributed storage system
CN111414603A (en)*2020-03-172020-07-14用友网络科技股份有限公司Application based on communication mechanism between named pipelines

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
孔雪辉;王述洋;黎粤华;: "面向网络安全的关于僵尸网络的研究", 中国安全科学学报, no. 07, pages 110 - 118*
石鲁生: "高效与精细的结合――Linux的进程管理", 塔里木大学学报, no. 03, pages 64 - 67*
邓熙;王瑶;李映壮;刘松涛;吴晨花;: "基于DNS流量组评分的僵尸网络拓扑发现", 科技创新导报, no. 24, pages 143 - 147*
陈杰;陈家琪;: "基于终端通信特征的P2P僵尸主机检测", 信息技术, no. 02, pages 49 - 52*
马振海;: "为进程管理传递正能量", 个人电脑, no. 09, pages 101 - 104*

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN114116201A (en)*2021-10-292022-03-01上海欣兆阳信息科技有限公司Data interaction method between marketing platform and media platform

Also Published As

Publication numberPublication date
CN111898158B (en)2023-09-26

Similar Documents

PublicationPublication DateTitle
EP3623963B1 (en)Log entry duplication method and device, computer equipment, and storage medium
US9778998B2 (en)Data restoration method and system
US7870296B2 (en)High availability system and execution state control method
US20110107344A1 (en)Multi-core apparatus and load balancing method thereof
CN103475899B (en)Data distributing method and device
CN103152419A (en)High availability cluster management method for cloud computing platform
CN103530200A (en)Server hot backup system and method
CN109308242B (en)Dynamic monitoring method, device, equipment and storage medium
CN103020304A (en)Data processing method and equipment
US7886181B2 (en)Failure recovery method in cluster system
CN105426213A (en)Software update method and system
CN112579356B (en)Fault processing method and server
JPWO2006057061A1 (en) Distributed transaction processing method, apparatus, and program
CN111898158A (en)Encryption method for OFD (office file format) document
CN108471612A (en)SIM card falls card restoration methods, device and terminal
US20200177685A1 (en)Device management server and method
CN102591993A (en)Asynchronous processing method and device for hotlist data update
CN108241616B (en)Message pushing method and device
CN109905459B (en)Data transmission method and device
CN116560802B (en)Virtual machine load-based virtual machine self-adaptive thermal migration method and system
CN103259863B (en)Based on the system and method that the control zookeeper of cluster serves
CN103488549B (en)Roll-back processing system and roll-back processing method for multi-mirror-image data
CN113448755B (en)Transaction routing method and device for switching between new and old systems
CN108173892B (en)Cloud mirror image operation method and device
CN110908821B (en)Method, device, equipment and storage medium for task failure management

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp